Sciweavers

762 search results - page 105 / 153
» Behavioural Models for Group Communications
Sort
View
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
14 years 2 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
PAMI
2011
13 years 4 months ago
Multiperson Visual Focus of Attention from Head Pose and Meeting Contextual Cues
—This paper introduces a novel contextual model for the recognition of people’s visual focus of attention (VFOA) in meetings from audio-visual perceptual cues. More specificall...
Sileye O. Ba, Jean-Marc Odobez
IJMMS
1998
153views more  IJMMS 1998»
13 years 8 months ago
Brahms: simulating practice for work systems design
A continuing problem in business today is the design of human-computer systems that respect how work actually gets done. The overarching context of work consists of activities, wh...
William J. Clancey, Patricia Sachs, Maarten Sierhu...
LCN
2007
IEEE
14 years 3 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
FGCS
2002
153views more  FGCS 2002»
13 years 9 months ago
HARNESS fault tolerant MPI design, usage and performance issues
Initial versions of MPI were designed to work efficiently on multi-processors which had very little job control and thus static process models. Subsequently forcing them to suppor...
Graham E. Fagg, Jack Dongarra